Security

What is SQL Injection?

Structured Query Language Injection is a way of code modification technique which is used to change the data from SQL databases. By using this command, any unauthorized user can use to identify a more privileged user. In modern technique, SQL injection occurs over the internet by sending queries to an API endpoint. Some query field …

What is SQL Injection? Read More »

What is web scraping?

Web scraping is the process of data extraction from different websites. It is done by using a piece of code known as “scraper”. It includes sending a ‘GET’ type query and then HTML parsing of the received content. After parsing, the scraper searches for the specified data and convert it into the specified document.  The …

What is web scraping? Read More »

What is a Phishing attack?

Phishing is a social engineering attack which is an attempt to steal sensitive and personal user information with the ill intents of gaining illegal access or financial gains. The stolen information can be in the form of usernames, passwords, bank account details or credit card numbers. The attackers utilize this information in two ways: either …

What is a Phishing attack? Read More »

What is token authentication?

Via token authentication features, users can implement access control via URL parameters or HTTP request headers without having to build complex back-end systems Take mlytics platform as an example, we will check these tokens at the Web Application Firewall (WAF) before any request is relayed to an origin. If the token is not valid the request is …

What is token authentication? Read More »

What is a man-in-the-middle attack?

A man-in-the-middle attack is a method which an attacker places himself in between the two devices and intercepts or modifies the messages/communication. The attacker is also able of impersonating as either of two agents and can do unauthorized actions. The attack needs three participants: the victim, the entity/system under attack and the middleman who eavesdrops. …

What is a man-in-the-middle attack? Read More »

Mitigating a DDoS attack

The DDoS mitigation is a process of protecting the targeted network from the anticipated DDoS attack. A special purpose network equipment or an alternative cloud-based security measures are used for protecting the networks from attackers. Typically, a DDoS mitigation process consists of 4 steps: The detection of possible traffic flow anomalies that may indicate the …

Mitigating a DDoS attack Read More »